From Practice to Theory: The "Bright Illumination" Attack on Quantum Key
Distribution Systems
- URL: http://arxiv.org/abs/2011.02152v1
- Date: Wed, 4 Nov 2020 06:50:26 GMT
- Title: From Practice to Theory: The "Bright Illumination" Attack on Quantum Key
Distribution Systems
- Authors: Rotem Liss, Tal Mor
- Abstract summary: The "Bright Illumination" attack is a practical attack, fully implementable against quantum key distribution systems.
Here we explain how the "Reversed-Space" methodology of attacks, complementary to the notion of "quantum side-channel attacks," has missed the opportunity of predicting the "Bright Illumination" attack.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The "Bright Illumination" attack [Lydersen et al., Nat. Photon. 4, 686-689
(2010)] is a practical attack, fully implementable against quantum key
distribution systems. In contrast to almost all developments in quantum
information processing (for example, Shor's factorization algorithm, quantum
teleportation, Bennett-Brassard (BB84) quantum key distribution, the
"Photon-Number Splitting" attack, and many other examples), for which theory
has been proposed decades before a proper implementation, the "Bright
Illumination" attack preceded any sign or hint of a theoretical prediction.
Here we explain how the "Reversed-Space" methodology of attacks, complementary
to the notion of "quantum side-channel attacks" (which is analogous to a
similar term in "classical" - namely, non-quantum - computer security), has
missed the opportunity of predicting the "Bright Illumination" attack.
Related papers
- A General Quantum Duality for Representations of Groups with Applications to Quantum Money, Lightning, and Fire [8.714677279673738]
We show that manipulating quantum states in one basis is equivalent to extracting values in a complementary basis.
We present the first secure quantum lightning construction based on a plausible cryptographic assumption.
We show equivalence among four security notions: quantum lightning security, worst-case and average-case cloning security, and security against preparing a canonical state.
arXiv Detail & Related papers (2024-11-01T11:56:11Z) - (Quantum) Indifferentiability and Pre-Computation [50.06591179629447]
Indifferentiability is a cryptographic paradigm for analyzing the security of ideal objects.
Despite its strength, indifferentiability is not known to offer security against pre-processing attacks.
We propose a strengthening of indifferentiability which is not only composable but also takes arbitrary pre-computation into account.
arXiv Detail & Related papers (2024-10-22T00:41:47Z) - Deploying hybrid quantum-secured infrastructure for applications: When
quantum and post-quantum can work together [0.8702432681310401]
Quantum key distribution is secure against unforeseen technological developments.
Post-quantum cryptography is believed to be secure even against attacks with both classical and quantum computing technologies.
Various directions in the further development of the full-stack quantum-secured infrastructure are also indicated.
arXiv Detail & Related papers (2023-04-10T13:44:21Z) - Quantum Public Key Distribution using Randomized Glauber States [0.0]
State-of-the-art Quantum Key Distribution (QKD) is based on the uncertainty principle of qubits on quantum measurements.
We propose a novel quantum key distribution mechanism over a pure optical channel using randomized Glauber states.
arXiv Detail & Related papers (2023-02-15T14:12:52Z) - Theory of Quantum Generative Learning Models with Maximum Mean
Discrepancy [67.02951777522547]
We study learnability of quantum circuit Born machines (QCBMs) and quantum generative adversarial networks (QGANs)
We first analyze the generalization ability of QCBMs and identify their superiorities when the quantum devices can directly access the target distribution.
Next, we prove how the generalization error bound of QGANs depends on the employed Ansatz, the number of qudits, and input states.
arXiv Detail & Related papers (2022-05-10T08:05:59Z) - Quantum dynamics corresponding to chaotic BKL scenario [62.997667081978825]
Quantization smears the gravitational singularity avoiding its localization in the configuration space.
Results suggest that the generic singularity of general relativity can be avoided at quantum level.
arXiv Detail & Related papers (2022-04-24T13:32:45Z) - Experimental quantum key distribution certified by Bell's theorem [0.0]
cryptographic key exchange protocols traditionally rely on computational conjectures to provide security against eavesdropping attacks.
quantum key distribution protocols provide information-theoretic security against such attacks.
However, quantum protocols are subject to a new class of attacks exploiting implementation defects in the physical devices involved.
We present here the experimental realisation of a complete quantum key distribution protocol immune to these vulnerabilities.
arXiv Detail & Related papers (2021-09-29T17:52:48Z) - Detector blinding attacks on counterfactual quantum key distribution [0.0]
Counterfactual quantum key distribution protocols allow two sides to establish a common secret key.
Part of the quantum state used to establish each bit never leaves the transmitting side, which hinders some attacks.
We present two attacks that use this ability to compromise the security of counterfactual quantum key distribution.
arXiv Detail & Related papers (2020-11-05T07:41:39Z) - Secure Two-Party Quantum Computation Over Classical Channels [63.97763079214294]
We consider the setting where the two parties (a classical Alice and a quantum Bob) can communicate only via a classical channel.
We show that it is in general impossible to realize a two-party quantum functionality with black-box simulation in the case of malicious quantum adversaries.
We provide a compiler that takes as input a classical proof of quantum knowledge (PoQK) protocol for a QMA relation R and outputs a zero-knowledge PoQK for R that can be verified by classical parties.
arXiv Detail & Related papers (2020-10-15T17:55:31Z) - From a quantum theory to a classical one [117.44028458220427]
We present and discuss a formal approach for describing the quantum to classical crossover.
The method was originally introduced by L. Yaffe in 1982 for tackling large-$N$ quantum field theories.
arXiv Detail & Related papers (2020-04-01T09:16:38Z) - Quantum-secure message authentication via blind-unforgeability [74.7729810207187]
We propose a natural definition of unforgeability against quantum adversaries called blind unforgeability.
This notion defines a function to be predictable if there exists an adversary who can use "partially blinded" access to predict values.
We show the suitability of blind unforgeability for supporting canonical constructions and reductions.
arXiv Detail & Related papers (2018-03-10T05:31:38Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.